Skip to content

Commit

Permalink
Prevent sandbox escape via 'BaseRequest.traverseName'.
Browse files Browse the repository at this point in the history
Fixes LP #1095343.
  • Loading branch information
tseaver committed Jul 5, 2013
1 parent 35cd714 commit aa498e1
Show file tree
Hide file tree
Showing 2 changed files with 3 additions and 0 deletions.
2 changes: 2 additions & 0 deletions doc/CHANGES.rst
Original file line number Diff line number Diff line change
Expand Up @@ -8,6 +8,8 @@ http://docs.zope.org/zope2/
2.13.21 (unreleased)
--------------------

- LP #1095343: prevent sandbox escape via ``BaseRequest.traverseName``.

- LP #1094144: prevent arbitrary redirections via faked "CANCEL" buttons.

- LP #1094221: add permissions to some unprotected methods of
Expand Down
1 change: 1 addition & 0 deletions src/ZPublisher/BaseRequest.py
Original file line number Diff line number Diff line change
Expand Up @@ -346,6 +346,7 @@ def traverseName(self, ob, name):
ob2 = adapter.publishTraverse(self, name)

return ob2
traverseName__roles__ = ()

def traverse(self, path, response=None, validated_hook=None):
"""Traverse the object space
Expand Down

0 comments on commit aa498e1

Please sign in to comment.